
Inside Laundry Bear: Unveiling Infrastructure, Tactics, and Procedures
Dutch intelligence agencies AIVD and MIVD, alongside Microsoft Threat Intelligence, have identified Laundry Bear also…
Threat Actors Claim Breach of Airpay Payment Gateway
Cybercriminals have reportedly claimed a successful breach of Airpay, an Indian payment gateway service, raising…
400,000 WordPress Websites Exposed by Post SMTP Plugin Vulnerability
A critical security vulnerability has been discovered in the popular Post SMTP plugin for WordPress,…
Women’s Dating App “Tea” Data Leak Exposes 13,000 User Selfies
Tea, a women-only dating safety app that allows users to review and share information about…
US AI Action Plan To Remove Misinformation, DEI References
MediaNama’s Take: The US aims to control AI technology and become a global leader in…
Supreme Court Uses AI for Case Efficiency As Cases Pile Up
MediaNama Take: The Supreme Court’s adoption of AI tools, ranging from transcription and translation to…
Hackers Breach Intelligence Portal Used by the CIA and Other Agencies
Unidentified hackers have successfully compromised a critical intelligence website operated by the National Reconnaissance Office,…
12x Ways To Build Powerful Gov Backlinks That Increase Search Traffic
Want to learn how to build gov backlinks? Gov backlinks have the power to dramatically…
Leak Zone Dark Web Forum Breach Exposes 22 Million User IPs and Locations
A significant data breach has exposed sensitive information about users of Leakzone, a prominent dark…
Stealing Login Credentials from 19 Major Browsers
A sophisticated new information stealer named SHUYAL was recently discovered by Hybrid Analysis. It has…